Nowadays, wastes in the form of solid, liquid, and gas are becoming a life threatening issue for the entire world. Besides health hazards, the waste management involves a very big deal of financial, human and other resources. The living condition of people is severely impacted because of improper waste management. In the present scenario, waste management is the main agenda of the upcoming smart cities. In this regard, a huge amount is spared for handling the waste issues. This paper proposes a method for collecting and transporting solid wastes from garbage bins to dump yards. Embedded system and Internet of Things (IoT) are used to obtain the garbage levels from garbage bins at regular intervals. The sensors deployed in the bins capture the status of bins and communicate to the control centre for arriving at an optimal way of waste collection. Algorithmic techniques are applied to compute the shortest paths between bins located in the vicinity and bins placed in faraway places. Based on these information, the proposed system recommends an effective garbage collection and transportation sequence. The best, worst and average case waste collection and transportation scenarios are also dealt with the paper
To handle the data traffic in the mobile covers a lot of self-sufficient portable hubs that conveys through remote correspondence in a foundation less condition. Essential part of a multicasting scheduling algorithm are utilized in gathering correspondence instruments like reserved multicast address blocks in IPv4 and IPv6. The first propose a customer multicast booking calculation which limits the normal data transfer capacity utilization given a specific reserve allotment. At that point define the reserve allotment issue under the full access design into a raised issue, which can be adequately unraveled by a water-filling calculation. Caching procedure is coming from the proposal of keep the popular content at the Small-Unit central administration via telecommunication links. Multicast is utilized to lessen vitality and transfer speed utilization of remote system by serving simultaneous client demands for a similar substance by means of regular multicast stream. Blend of Cache and multicast is viable when there is happening rehashed asked for a couple of substance documents show up after some time. It can in reality decrease vitality costs. The additions over existing reserving plans are most minimal rate when clients endure deferral of three minutes, expanding further with the sharpness of substance get to design
Aspect based opinion mining provides feature specific opinions of the users about the product. social networking sites like twitter, Facebook and e-commerce web sites are good sources of online reviews. Automobile manufactures can make use of reviews about specific feature of a particular make and model of the automobile to better understand the customers need. Car manufacturers dominate the automobile market and there is a heavy competition among car makers to capture a better market place. Aspect mining on reviews about cars can help the manufacturers to gather valuable information about specific features and the performance related aspects of a particular make. Mining customer reviews may provide a better insight on the features that must be improved, modified or upgraded to satisfy the customers. This paper proposes an aspect mining technique to analyze feature specific feedback about various car models and identify the features liked and disliked by the users. This information serves as an important input for the manufacturers to concentrate on the aspects that may interest the customers while the automobile is under design.
Laser forming is an innovative process of non-contact die bending process, which has potential use in manufacturing and automotive industry. In this process are very difficult to machine tool using conventional process like deep drawing, stamping, etc. In this process, sheet metal bent by using a medium power Fiber laser. The material deforms due to thermal mechanical stress induced in the material due to laser heating no spring back effect. An experimental investigation is performed for bending of material by varying laser power, scan speed, no of passes. The experimental results show that on 0.4mm Mild steel sheets using maximum power of 50W. Various parameters were varied namely power (35W to 50W), number of passes (1 to 50), scan speed (10 to 20mm/min), laser spot diameter (0.1 to 0.5mm) to get maximum bending angle. Microstructure analysis of the deformed region and the heat-affected zone in comparison with the base material is done. In addition, the variation of tensile strength for all these regions is studied
Distributed computing provides different approaches to share solid amount of distributed files holds a section with various associations. Distributed computing could be indicates the hierarchy and package of distinct files, for example, programming, applications and data as administrations over the cloud (web) on interest. That is a decent method to share numerous sorts of distributed files, however it likewise produce security issues more entangle and more imperative for clients than previously. In this venture, secure distributed algorithm executes Hadoop Map Reduce structure over multiple distributed storage system (MDS) and estimates its execution on a general heterogeneous group of gadgets. The realization of Hadoop inclusive file frame for MDS which construct the framework interoperable with another Hadoop frames like HBase. There is no evolution required for existing HDFS applications to be sent over MDS. To the best of our intuition, this is the essential task to import Hadoop Map Reduce for adaptable cloud that literally dwelling the hazards of the dynamic system condition. Our framework gives a distributed figuring model to handling the huge datasets in versatile condition while proving stable assurances for vitality production, information unwavering quality, data region and security.
Deep drawing is a sheet metal forming process which is widely used in manufacturing parts for automobile and aircraft industries of good strength and light weight. There are many process parameters and other factors that affect product quality produced by deep drawing. In this project, the effect of the geometrical parameters involved and the defects encountered in the process are presented and discussed. Wrinkling and tearing are common surface defects in sheet metal forming which are unacceptable in the industries. Due to the rejection of the defective part, there is wastage in the production process, not only in terms of time but money as well. So, the prediction and prevention of defects becomes necessary. The problem of wrinkles appear on the curved surface of part along with cracking during the drawing operation. Therefore, it was necessary to find out the forming limit diagram so as to minimize losses
VLSI circuits can be of both as combinational and sequential. In sequential circuits the major source of dynamic power consumption is clock.Clock signal is a great source of power dissipation because of high frequency and load. The technique of clock gating is used to reduce the clock power consumption by cutting off the idle clock cycles. One can save power by reducing unnecessary switching activity inside the gated module using clock gating. Here various gating methods are discussed and their power dissipation is compared. The most popular is synthesis-based, deriving clock enabling signals. It unfortunately leaves the majority of the clock pulses driving the flip flops (FFs) redundant. A Data Driven method stops most of those and yields higher power savings, but its implementation is complex. Next method called Auto Gated FFs (AGFF) is simple butrelatively yields small power savings.Another finest method called Look Ahead Clock Gating (LACG). It avoids the tight timing constraints of AGFF and data driven but it tends to be application dependent. Fi nally the more efficient method is developed namely Race free clock gating based on a set-reset latch. It can completely remove the time race of the circuit.Here this technique is implied with the sequential circuit of D-flip flop and the dynamic power reduction is achieved up to 34%. Circuit is well designed with Tanner EDA tool and circuit is simulated to achieve desired power output
Leukemia is the type of diseases in this modern world. Leukemia is common type of cancer that turn up from blood and bone marrow. Manually done detections are time consuming and has less accuracy . In the existing methodology of automated detection of leukemia, the segmentation of the image is done by the k-mean clustering and zack algorithm that has been used for grouping the white blood cells and the feature extraction was done by calculating the colour features, geometric features, texture features and statistical features.In this paper, we proposed a methodology of the Gray level co-occurrence matrix for feature extraction and in case of feature classification we used support vector machine. With this method, we can detect the leukemia with higher segmentation accuracy and time consumption.
In this paper, a circular patch antenna with Coplanar Waveguide (CPW) feed for LTE application is proposed. The advanced antenna displays a decent impedance matching inside the LTE Bands 2600 MHz. The planar monopole radio wires with coplanar waveguide (CPW) nourishing component has considered here. Its points of interest over microstrip compose feed lines, for example, low scattering, low radiation spillage, the capacity to successfully control the trademark impedance, and the simplicity of mix. The proposed antenna is compact in size and less cost to fabricate. The gain and efficiency of this antenna is good. The antenna designed using the simulator High Frequency Structure Simulator (HFSS).
Bug report collection system is a "Bug tracking system" or set of scripts which maintains a database. Our system not only detects the bugs but provides complete information regarding detected bugs. The problem in the older system can be defined as the whole project maintenance, user maintenance, their assignment has to be maintained manually. The developer resolves the issues as per the requirements. In the testing phase, the tester will identify and enters the bugs into the system. Whenever the tester encounters 'n' number of bugs, description and bug priority and the bug images will be added in the database.The manager will assign bugs to the developer. The main objective of the proposed system is to fully analyze the bugs and report the same to the developer in an efficient manner so that the developer can get the right information. Bugs may be caused by tiny coding errors, but the results of bugs can be serious, finding and fixing bugs is a rather challenging task. For that purpose, our system contains a run time engine in that the code can be tested and reported to the developer. The developer will get the code snippet of that code so that the developer can easily understand the issue related to it.
The prominent amongst the majority needful issues in some frameworks that has risen in a great part of interests as of late, is connect expectation. The System deals with a wide range of complex frameworks, for example, social media. In such complex situations, there are many difficulties and issues that can be deliberated and considered. The most recent couple of years, numerous examinations have been tested on connection forecast however the current procedures are not suitable in handling the structured data which are portraying the multifaceted nature that is highly efficient. Numerous examines in traditional techniques demand that endpoint impact deals to by endpoint degree, wants to encourage the relationship between the high degree endpoints. The advanced mining user- sensible rare sequential topic patterns in recorded streams constitutes of three stages. At first, learned archives are crawled from small scale blog destinations, and are formed as a report stream for our methodology. At that situation, as preprocessing algorithm and partition algorithm applied for the initial stage stream is changed to a subject dimensional archive stream and then divided into many sessions to differentiate the total client process. Our straight data structure empowers us to elaborate a high headed for amazing pruning and to straightly distinguish the high serviceability
This adventure centers around the population were spreading the emergency occasion on three different states (outburst, decay and inactive). These are the three different states can ready to categorize the crisis occasion and distribute the data through web resource. An emergency occasion can occur whenever. So the inactive client may not break down the incident and release the news through web resource. This may achieved simply because of the best suitable consider of the particular time. This may create the web resource which based on various situation is created so as to tell the people crowd of a crisis occasion plainly and help to the government processes the crisis occasions frequently. The underlying condition of the state can be used to portray the underlying status of the critical occasion. The experimental outcome illustrates that break down will be utilized to settle on the right choice for the client.
Despite the possibility of short term financial losses and concerns by executive management of potential failure, Enterprise Information Technologies (EITs) are being implemented by a growing number of Fortune 100 and midsize corporations in the hope of acquiring long term benefits. EITs, expensive and risky information technology assets, must be evaluated on the basis of both their productivity gains and their support for corporate reengineering through integration of business processes. In this paper, I propose a two stage methodology AHP and ANP to conduct a high level evaluation of an interdependent set of tangible, intangible, strategic and operational factors that should be considered in EIT evaluation. I perform sensitivity analyses and conduct tests with real world data to show the robustness of our methodology and the resulting managerial implications.
In many engineering problems, we come across different problem of shape optimization during the design of components. In this paper we'll be optimizing the shape of an airfoil using an optimizing algorithm called Genetic Algorithm. Genetic Algorithm is an evolutionary algorithm which works on the principle of survival of the fittest. Compared to other optimization techniques, genetic algorithm can give a satisfactory result within a short time frame. The optimization process will be to obtain an airfoil shape with the highest lift to drag ratio. We'll be using a modified type of genetic algorithm specifically useful for shape optimization. NACA0012 will be the base airfoil on which the optimization process will be done. The airfoil shape is varied within some prescribed constraints. The airfoil which is obtained after the optimization process is expected to have a higher lift to drag ratio than the airfoil at the beginning. Subsequent execution of the optimization process may produce airfoils with higher lift to drag ratio.
This paper represents fault localization of underground low tension ac power cable and monitoring using iot. The various types of faults namely short circuit, open circuit, line to line fault can be found using this method. The setup consists of number of ceramic resistors representing cable length in kilometres. The fault creation is done manually using push button switches and the data is transferred to arduino ,the resistance value is calculated and the distance of the fault is found by measuring with the standard value. The data is transferred to Thinspeak IoT platform using ESP 8266 Wifi module. As it is connected to the web server, both supervisor and consumer can able to view the data and they can arrange for an alternate power source
In Now-a-days health problems are arising day by day at a very high rate. The growing number of older people emerges the need to consider autonomy concerns for those people and their need for intensive care.AAL technologies can also provide more safety for the elderly people. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health,environment conditions with the help of innovative technologies and services.The innovative technologies enabling the Internet of Things (IoT) can be used in order to capture personal data for automatically recognizing changes in elderly people behavior in an unobtrusive, low-cost and low-power modality. The main aim of the project is to monitor the health and environment condition of the old age adults using ambient assisted living technology withIoT.The ambient assisted living technology is also used to monitor the mobility of elderly people using IoT thereby improving the quality of life with less dependence. . The proposed model is to monitor the health of elderly people by means of various sensors and also focus on elderly people activities.A design to monitor the elder people health conditions such as heart beat, body temperature, room temperature and user mobility a send to the information to guardian continuously using IOT.
Conventionally, visually challenged people use white cane to walk which provides very limited utility. In order to improve the safety of visually challenged people, a smart device is needed. In this paper we present a low cost durable smart stick which helps the visually challenged people to navigate independently without much difficulty. The proposed model consists of GPS and GSM modules along with different sensors like ultrasonic sensors and water sensor. The stick is additionally supported with the voice feedback given through the headphones to alert the visually challenged people in the indoor and outdoor environments. Ultrasonic sensors are mounted on the stick to detect obstacles at the waist levels in all three directions. Water sensor is kept at the bottom of the stick to detect the presence of water or wet surface. At panic situations, the user’s location is sent to the guardian via GPS and GSM modules.
UAV is basically a military technology now evolved as Drone for general public use. Drone is defined as an unmanned aerial vehicle which can fly autonomously and do activities by its own without a human control. The main challenges the Tamilnadu State faced included holding a large chunk of rainfed area, erratic monsoons, and the only State to have faced the tsunami. Precision agriculture requires real time data and the ability of UAV's to fly over crops and quickly gather crop management data makes them a solution to this need. Advancements in guidance systems, batteries, and control systems have made these drones both plausible and practical and my field results at local research areas have proven that they can be usedeffectively. Climate change can also have an impact on agricultural production by affecting the distribution of economically important crops. The comfort of the climate is easy to find. It is easy to for farmers to cultivate in mountain areas. This technology is very simple and understandable method for farmers. We can control this technology through smart phone. With the approval of the government it will be much easier to implement. It can do human unmanageable task To create employment and young entrepreneurs by implementing UAV system with the help of organized research.
During Cardiopulmonary Bypass surgery condition the Partial pressure of Carbon dioxide (PCO2) is controlled by varying the total Gas Flow rate. If total Gas Flow rate in the blender is decreased, the Oxygenator allows accumulation of CO2 in fiber lumens of membrane and washes out only a less amount of CO2 present in the arterial blood, which leads to the raise of its PCO2 content. If the total Gas Flow rate in the blender is increased the oxygenator washes out more amount of CO2 present in the arterial blood which reduces its PCO2 content. The total Gas Flow rate is set manually by the perfusionist with respect to the Blood Flow rate and the Temperature condition of the patient. The PCO2 management by the perfusionist is a complicated process that may lead to Human fatal errors. So by the introduction of an automatic PCO2 control the errors can be completely eliminated which improves the accuracy and performance of perfusion system. In this work, ANFIS Forward modelling for auto regulation of PCO2 in perfusion system and the verification of output results for Mild, Moderate, Deep and Profound temperature conditions are discussed.
A convolutional neural network is the most popular network for deep learning. They eliminate the need for feature extraction and makes pattern classification in image dataset much easier. CNNs are useful for finding patterns in images to recognize objects, faces, actions, scenes and much more. Keras a high end python library allows us in implementing deep learning models fast and easy for research and development. In this paper we take our own bharathanatyam dataset which contains complex poses and use CNN built with keras to classify the actions. The parameters should be tuned properly for a good classification. Detailed explanations about the various parameters to be set are discussed in this paper.
In this century, the prevalence of handicapped sports people groups and rivalry among impaired competitors has developed greatly. With this ascent in introduction of, and interest in the handicapped sports comes an expansion to stress and torment. Outside mechanical stacking may expand the danger of shoulder grievances. The target of this writing audit was to distinguish and depict the pervasiveness as well as rate of shoulder protests in wheelchair competitors in the writing, to inspect the elements and hidden systems that could be conceivably included, and give a few bits of knowledge into the advancement of deterrent measures. A writing seek was directed to utilize and recognize applicable distributed articles. Any sort of shoulder grievance in connection at any dimension of world class, of any game, were incorporated. Articles were prohibited on the off chance that they did exclude any measurable investigation. Articles that included investigations with wheelchair competitors in mix with competitors of other handicap sports were prohibited so as to have the capacity to separate between the two. Story, exploratory and contextual analyses were additionally rejected. Two analysts freely evaluated articles for incorporation. Thirteen articles coordinated the choice criteria. These were made a decision on their quality by utilization of an adjusted form of the Webster agenda. Of the included investigations the general quality was low. A generally high predominance of objections was discovered, extending from 16% to 76%. Torment was observed to be a typical objection in wheelchair competitors. In light of the present writing the reason for shoulder issues is hard to distinguish and is likely multifactorial, in any case qualities of the client were appeared to build chance. Protection measures were indistinguishable. There might be a job for adjusted quality preparing regimens to diminish chance. Shoulder grumblings in wheelchair competitors are a typical issue that must be tended to further. Future investigations on shoulder abuse wounds of wheelchair competitors ought to be guided towards biomechanical demonstrating to create information of burden and its belongings.
Visual Object Tracking remains a significant computer vision task which consumes gained cumulative attention due towards its academic besides commercial potential. There remain various different methodologies must been proposed towards solve the problem. Compared with visual object tracking which emphases on appearance in video motion model and supplementary factors, visual object tracking shares these common challenges, and consumes certain additional challenging tasks to be undertook, such as identifying among visual objects, frequent occlusion due to the crowd, initializing and terminating of the object tracking, which making it difficult to get a comprehensive understanding of this problem. We stab towards make systematic appraisal on Visual Object Tracking. We review the modern advances in several aspects and introduce the frame separation, object detection, tracking, and masking of each aspect in detail. The foremost characteristics include visual object tracking algorithm. This analysis work can make available researchers, specifically novel comers towards the subject of Visual Object Tracking, a common sympathetic of the concept, and help them towards comprehend the features of a Visual Object Tracking system and the inter connection of these aspects.
This paper provides surveys about perceptual visual security index based on edge and text similarities. There are various techniques used for analyzing the behavior on content similarity and encrypted image. The huge amount of visual information is handled by image and video databases, which require effective and efficient mechanisms for indexing and search. In recent years, techniques have been proposed which allow users to search images by visual features, such as texture, color, shape, and sketch, besides traditional textual keywords. In the present era of information technology and proliferating computer network communications, cryptography assumes special importance. Cryptography is now routinely used to protect data, which must be communicated and/or saved over long periods, to protect electronic fund transfers and classified communications. In order to fulfill such a task, many image encryption methods have been proposed to protect the content of digital images, but some of them have been known to be insecure. It identifies “basic features” for the perception of visual texture: coarseness, contrast, directionality, line-likeness, regularity, and roughness. In either case, the segment descriptors can be used as medium-level descriptors for the extraction of semantic information. Alternatively, direct comparisons of segment textures with reference textures, utilizing a texture similarity metric, can also facilitate context analysis. The focus of this paper is on the visual similarity of two textures and low-level parameters, which can be used to quantify this similarity without taking semantics into account. The security goals of selective encryption are classified as confidentiality encryption, sufficient encryption, or transparent encryption. Sufficient encryption and transparent encryption can be generalized as perceptual encryption here because both of them require only visual security.
Plasmonics is the study that uses nanostructure material to control light .The optical excitation of plasmons on the surface of metal leads to electromagnetic field confinement. The confined electromagnetic fields generates thermal energy which is localised and intensed and also liberates large near-field optical forces.The field thus produced has large application in biology. The interaction between the localised thermal effect or optical effect and nearby molecules leads molecular plasmonics.The interactions between molecules and surface plasmons can fall under two main types: optical and thermal. When light drives the oscillation of the free electrons in the nanoparticle a plasmon resonance occurs on the suface of the metal.The fields can also interact with all kind of biomolecules and cells independent of their size. This helps us to understand and control the interactions between biomolecules and surface plasmons.This has a large application in biology as it could sense and analyse the cells, molecules and even more tiny particles in human body.This can be used for molecular detection. Due to the small size of a molecule, molecular plasmonics requires control over the size and shape of plasmon and also of that of the molecule including its location. Plasmonics can also be used for nanoscale imaging of biological systems.It gives a precised resolution images with high signal-to-noise ratio and low illumination power.Chemical vision is another possible applications of plasmonics. It allows to identify the chemical structure of any object with high resolution. Metal nanoparticles that use plasmonic effects can be more effective to release drug molecules. Nanoparticles exhibiting photothermal effects can also function as plasmonic gene switches.
The entirety on this world has been generated and invented for the easy residing of person like things together with strength, fuels, etc. It concentrates on power from renewable power systems like solar power. In the integration of solar photograph voltaic (PV) with battery energy storage gadget in single phase grid for residential and electric powered car utility. The battery plays a vital function of the system. Inside the proposed system proportional integral control technique and multilevel inverter topology is applied. This approach of implementation can provide continuous electricity to grid, less harmonic distortion and enhancing great of energy and battery power storage support connected to the system. The distinct modes of operation are accomplished using MATLAB surroundings.
The entirety in this international has been generated and invented for the clean living of human being like things such as electricity, fuels, and many others. It concentrates on electricity from renewable electricity structures like solar and wind strength. The objective is to suggest a multilevel inverter the use of hybrid picture voltaic (PV) with wind electricity device so that you can simplify the electricity device and reduce harmonics, voltage stress and the cost effect. Multilevel inverter the usage of mixture of sun and wind changed into applied with the aid of PWM modulation and filter technique. This method of implementation can limit the total harmonic distortion which is showed by using MATLAB environment.
The demand of electricity is increasing day by day, which provides way to explore different sources for generating electricity. Renewable energy resources such as Solar and Wind are widely spread and environmental friendly. Though they are environmental friendly and available at no cost, the major limitation lies in their intermittent nature. This limitation can be mitigated by the Hybrid Renewable Energy Systems, combining two or more renewable energy sources. For instance, Wind energy and Solar energy are complimentary to each other in their seasonal pattern. The objective of this work is modelling of a Wind-Solar hybrid system as a microgrid and analyze the system performance for different operating conditions. In this system, the Wind Energy Block consist of a Doubly Fed Induction Generator (DFIG), along with a Back to Back converter coupled at a DC Link. The Solar PV array is connected to the common DC link through DC-DC converter. Both Solar and Wind Energy blocks employ MPPT algorithm in their control blocks. Stator Flux Oriented Control technique is applied to the Back to Back converter in order to regulate the voltage and frequency of the line side converter. A modified incremental conductance algorithm is employed to operate the Solar System at MPPT. The system operates in a standalone mode, with a battery storage system. The charging and discharging of the battery is controlled by a bidirectional converter, based on the requirement of load, wind speed, irradiance conditions and battery SOC. A 15kW rated Solar and Wind System along with a battery capacity of 300AH is simulated in MATLAB/SIMULINK and the results are discussed for various operational conditions.
In increasing demand for high performance or throughput, parallel computing is becoming more important in high-performance computing systems, cloud computing systems, and communication systems. Massive MIMO, is a MIMO system with an especially high number of antennas. But still Standard MIMO network tends to use two or more antennas to transmit data and the same number to receive it. The advantage of a MIMO network over a regular one is that it can multiply the capacity of a wireless connection without requiring more spectrums. A fault tolerant design for integer parallel MVMs in the MIMO system is proposed here. This scheme combines ideas from error correction codes with the self-checking capability of MVM. Field programmable gate array evaluation shows that the proposed scheme can significantly reduce the overheads compared to the protection of each MVM on its own. This method used to enhance the fault coverage of data loss in the MIMO system. Therefore, the proposed technique can be used to reduce the cost of providing fault tolerance in practical implementations. Under realtime applications, integer vectors which come from ADCs with a fixed timing and processing is synchronous and repetitive. To the best of the knowledge, no other fault tolerant design for parallel MVMs has been proposed for the MIMO applications.
Error correction is one of the important techniques for detecting and correcting errors in communication channels, recollections, all types of system. But the SEC_DEC system are competing in the market due to its stumpy power, soaring density, cost helpfulness and design scalability. So, various DSP algorithms are used to overcome the delays by increasing the sampling charge. HC codes are extensively been worn for error recognition and rectification. In the proposed scheme, both syndrome calculator and encoder are combining implemented. Linear Feed Back Shift Register (LFSR) are used to implement the design of encoder for polynomial division and the decoder design is based on inversion-less Berlekamp-Massey algorithm (BMA),Chien search algorithm and syndrome calculator. The main improvement of LFSR is that it operates at high speed, but its main drawback is that the inputs are prearranged in bit serial. To prevail over these drawbacks, DSP algorithms such as selecting a better unfolding value reduce the mock-up period, decrease the clock succession, and increase the speed, power and the throughput.
In this paper, the analysis of heat transfer across finned surfaces is done using CFD software. Convective heat transfer between a surface and the surrounding has been a major issue and a topic of study for a long time. Fins are generally used to increase the heat transfer rate from the system to the surroundings. The Engine is one of the important components in an automobile which is subjected to high temperature and thermal stresses. In order to cool the engine, the fins are another component which is used to dissipate the heat from the Engine. By doing flow analysis on the engine cooling fins, it is helpful to know about the heat dissipation rate and the Principle implemented in this project is to increase the heat transfer rate, so in this analysis, Aluminum was used as the base metal for the fin material and the fins are modified by putting different types of shapes in the circular duct and square duct. The knowledge of efficiency and effectiveness of the fins are necessary for proper designing of fins. The main objective of our analysis is to determine the flow of heat to comparing the heat transfer by disc fin, rectangular fin, triangular fin available and the analysis is done by using ANSYS – CFD Fluent software.
Stock Gathering is a location in which a forecaster or depositor uses a organized form of analysis to conclude that a particular stock will make a good speculation and, therefore, should be added to his or her portfolio. The stock investment situation can be rise or decline. Increase means benefit from a stock price increase and decrease means benefit from a stock price decrease, depending on the investor's expectation of how the stock price is going to move. The stock assortment principles may include efficient stock picking methods that exploit computer software and data. To detect the connotation relationships, a data-mining unique stock conjecture algorithm is proposed here to mine antique stock prices so that based on the sensed relationship, rules that can foresee changes in stock prices can be erected. Two synthesis appliances (one probabilistic, one occurrence) aiming at discerning common information from fused technical gauges, produce the higher portfolio performances. Finally the stock alternative model can make a proﬁtable assortment in terms of both hoards return and model strength.
the diverse cell phones are gathered from nearby sources for recovering substantial metals by electro deposition process. The electro deposition process was conducted from a glass reactor setup of working volume 10 l. Copper bar was utilized as the anode and stainless-steel bar as the cathode for the deposition process. Five cell phone PCBs were embraced both for the dissolution and deposition processes. Metal powder has broken down and the greatest metal powder stored was 7.25g in 120 minutes, which is equivalent to 10% of most extreme recovery of metal powder from the PCBs. The greatest metal powder recovered in 120 minutes of the deposition process can be considered as the ideal for the 6 l of electrolyte solution. There is chance to recover the materials and scale it up, if proper laboratories and financing are made accessible.
The aluminium is widely used to manufacture light weight components with higher strengths. Aluminium recovery and reusing methods are important for sustainable manufacturing by recycling the aluminium wastes. The dross is a waste material obtained during melting process of aluminium. The dross is a major waste obtained during the process of melting which can be recycled and reused by physical and chemical methods. The environmental burdens due to these processes involved from aluminium extraction to the stage of its disposal can be reduced by recovery of aluminium from dross wastes. It is melted to obtain the aluminium present in the collected dross. To identify and reduce the impurities in the dross, it is subjected to leaching and washing processes respectively. The compression test for fine dross, Leached dross and ordinary aluminium dross was carried out to find the compressive load. The result shows that finer and processed dross bears high loads than ordinary dross.
News tabloids and online journals often express notions of news structures with respect to persons, locales, things while reporting on recent trivia. We propose a system that will allocate ratings indicating positive or negative tone to each distinct entity in the text subject. Our system identifies a sentiment in the first step by associating expressions with each relevant entity matter. This is followed by aggregation and rating step, wherein scores are assigned to each entity matter corresponding to other entities in the same class. Finally, we evaluate the significance of our scoring techniques over large corpus of news and blogs and any general text document. Although, Semantic word spaces have been very useful, they cannot express the meaning of longer phrases in a principled way. Further progress towards understanding compositionality in tasks such as sentiment detection requires richer training, evaluation resources and more powerful models of composition. To address challenges like sarcasm, slangs, abbreviations, we use the Recursive Neural Tensor Network (RNTN). This model outperforms all methods of basic NN models on several metrics. It pushes the state of the art in single sentence positive/negative classification and the expected accuracy is about 80% up to 85.4%.
Community radio is a radio service offering a third model of radio broadcasting in addition to commercial and public broadcasting. Community radio broadcast contents that are popular and relevant to specific audiences. The community radio stations are operated, owned, and influenced by the private communities. Community radio provides a mechanism for individuals, groups, and communities to tell their own stories and to share the experiences. This paper presents a new Software Defined Community Radio approach by using a Microphone, Triband Antenna, LabVIEW software and Universal Software Radio Peripheral (USRP).
Test case prioritization techniques schedule the execution order of test cases so as to reach certain target, such as an improved level of fault prediction. Prioritized requirements can be seen as the route of deriving an order relation on a given set of test cases derived from regression testing. Program changes between the versions can cause more test cases react differently on following versions of software. In this, a fixed approach to prioritizing test cases that avoid the foregoing drawbacks. This approach, JUnit test case Prioritization Techniques operating in the Absence of coverage information (JUPTA), differs from existing dynamic coverage-based test case prioritization techniques in that it prioritizes test cases depended on coverage information projected from fixed structures relatively than gathered through instrumentation and execution.
The social media has increased the opportunity to explore and track the response of new reforms and policies in India. Analysis of stock market data, new product launch and movie release are done with the help of social media. The Social media have become an emerging phenomenon due to the huge and rapid advances in information technology. Public uses social media as a medium for expressing their attitudes, sentiments and opinions. Sentiment analysis extracts positive and negative opinions from the social media. It is performed on the input dataset that initially performs data cleaning by removing the stop words and then by classifying as positive and negative by considering the polarity of words. Sentiment classification is one of the front runners in the text mining techniques which help business, data scientists and social media. Sentiment analysis is a technique used to analysis the opinions and automatically predicts sentiment polarity. The main application area of sentiment analysis is opinion mining, advertising, opinion summarization, and market research. However, in different domains sentiment is expressed differently. The reason is that words and even language constructs used in different domains for expressing opinions can be quite different. A classifier trained on one domain typically performs poorly on test data from another domain. Cross-domain sentiment classifier trained on one domain called source domain and predict another domain, the target domain. Cross-domain Sentiment Classification uses natural language processing, machine learning, text analysis, statistical and linguistics knowledge to identify, investigate establish and extract information from documents. This paper presents a brief survey of cross domain sentiment analysis techniques that used recently.
In these days, genuine voting system is needed because of the increase in illegal voting in India. Our project proposes to develop a smart voting machine using Aadhar card and fingerprint to avoid the delusion occurring in the election. For the enrollment of aadhar database process, our government enrolled the ten fingers of the fingerprints, image of iris, mobile number and other details of the citizens of India. So when the government links the identity of voter to the aadhar database, each and every person can easily cast their vote using biometric authentication. So in our project, voting process is done by using aadhar card and fingerprint impression with the control of ARM CORTEX MO+. For the purpose of authentication, fingerprint impression is needed and requires Aadhar card for identity. The voter’s fingerprints are enrolled and stored initially. During the process of voting, the person needs to enter the aadhar number and places the fingerprint impression. When the given fingerprint matches with the Aadhar database, the voter will be allowed to cast their vote. After voting process is done, the voted person gets the intimation through Global System for mobile (GSM) to the mobile number which is linked with the Aadhar card.